AIS 5

    Cards (83)

    • Hacking
      Unauthorized access, modification, or use of a computer system or other electronic device
    • Social Engineering
      Techniques, usually psychological tricks, to gain access to sensitive data or information
    • Malware
      Any software which can be used to do harm
    • Hijacking
      • Gaining control of a computer to carry out illegal activities without the user's knowledge
    • Botnet Robot Network
      • Network of hijacked computers
      • Hijacked computers carry out processes without users knowledge
      • Zombie -hijacked computer
      • Bot Herders
    • Denial-of-Service (DoS) Attack
      • Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service
    • Spamming
      • Simultaneously sending the same unsolicited message to many people at the same time, often in an attempt to sell something
      • Spammers also stage dictionary attacks (also called direct harvesting attacks)
    • Spoofing
      • Making an electronic communication look as if it comes from a trusted official source to lure the recipient into providing information
    • Zero-day attack
      • Attack between the time a new software vulnerability
    • Cross-Site Scripting (XSS)

      • Unwanted code is sent via dynamic Web pages disguised as user input
    • Buffer Overflow
      • Data is sent that exceeds computer capacity causing program instructions to be lost and replaced with attacker instructions
    • SQL Injection (Insertion)
      • Malicious code is inserted in the place of query to a database system
    • Man-in-the-Middle
      • Hacker places themselves between client and host. Intercept
    • Masquerading or impersonation
      • Pretending to be an authorized user to access a system
    • Piggybacking
      • riding with someone
    • Password Cracking
      • Penetrating system security to steal passwords
    • War Dialing
      • Computer automatically dials phone numbers looking for modems
    • Phreaking
      • Attacks on phone systems to obtain free phone service
    • Data Diddling
      • Making changes to data before, during, or after it is entered into a system
    • Data Leakage
      • Unauthorized copying of company data
    • Pod slurping
      • Using a small device with storage capacity to download unauthorized data
    • Salami Technique
      • Taking small amounts from many different accounts
    • Cyber-extortion
      • Threatening to harm a company or a person if a specified amount of money is not paid
    • Cyber-Bullying
      • Using the Internet, cell phones, or other communication technologies to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person
    • Sexting
      • Exchanging sexually explicit text messages and revealing pictures, usually by means of a phone
    • Internet Terrorism
      • Act of disrupting electronic commerce and harming computers and communications
    • Internet Misinformation
      • Using the Internet to spread false or misleading information
    • Internet Auction
      • Using an Internet auction site to defraud another person
      • Unfairly drive up bidding
      • Seller delivers inferior merchandise or fails to deliver at all
      • Buyer fails to make payment
    • Click fraud
      • Manipulating click numbers to inflate advertising bills
    • Internet Pump-and-Dump
      • Using the Internet to pump up the price of a stock and then selling it
    • Web cramming
      • Offering a free website for a month, developing a worthless website, and charging the phone bill of the people who accept the offer for months, whether they want to continue using the website or not
    • Software piracy
      • Unauthorized copying or distribution of copyrighted software
      • Selling a computer with preloaded illegal software
      • Installing a single-license copy on multiple machines
      • Loading software on a network server and allowing unrestricted access to it in violation of the software license agreement
    • Identity Theft
      • Assuming someone else's identity
    • Pretexting
      • Inventing a scenario, that will lull someone info divulging sensitive information
    • Posing
      • Using a fake business to acquire sensitive information
    • Phishing
      • Sending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive data
    • Pharming
      • Redirects Web site to a spoofed Web site
    • Carding
      • Refers to activities performed on stolen credit cards
    • Evil twin
      • Wireless network with the same name as a legitimate wireless access point
    • Typosquatting/URL Hijaking
      • Typographical errors when entering a Web site name cause an invalid site to be accessed
    See similar decks